Vulnerabilites related to hpe - hpux-ntp
CVE-2018-7170 (GCVE-0-2018-7170)
Vulnerability from cvelistv5
Published
2018-03-06 20:00
Modified
2024-08-05 06:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:24:10.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "name": "103194", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103194" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T18:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "name": "103194", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103194" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7170", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "name": "https://security.netapp.com/advisory/ntap-20180626-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3415", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3415" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_13", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "name": "103194", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103194" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7170", "datePublished": "2018-03-06T20:00:00", "dateReserved": "2018-02-15T00:00:00", "dateUpdated": "2024-08-05T06:24:10.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7185 (GCVE-0-2018-7185)
Vulnerability from cvelistv5
Published
2018-03-06 20:00
Modified
2024-08-05 06:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:24:11.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "name": "USN-3707-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "103339", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103339" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3454" }, { "name": "USN-3707-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3707-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T18:06:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "name": "USN-3707-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "103339", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103339" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3454" }, { "name": "USN-3707-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3707-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "GLSA-201805-12", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201805-12" }, { "name": "FreeBSD-SA-18:02", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "name": "USN-3707-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3707-2/" }, { "name": "https://security.netapp.com/advisory/ntap-20180626-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "name": "103339", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103339" }, { "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3454", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3454" }, { "name": "USN-3707-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3707-1/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_13", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7185", "datePublished": "2018-03-06T20:00:00", "dateReserved": "2018-02-16T00:00:00", "dateUpdated": "2024-08-05T06:24:11.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7434 (GCVE-0-2016-7434)
Vulnerability from cvelistv5
Published
2017-01-13 16:00
Modified
2024-08-06 01:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "94448", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3082" }, { "name": "40806", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40806/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037354" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "name": "FreeBSD-SA-16:39", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-20T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "94448", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3082" }, { "name": "40806", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40806/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037354" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "name": "FreeBSD-SA-16:39", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "94448", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94448" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3082", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3082" }, { "name": "40806", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40806/" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "name": "http://nwtime.org/ntp428p9_release/", "refsource": "CONFIRM", "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037354" }, { "name": "https://bto.bluecoat.com/security-advisory/sa139", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "name": "FreeBSD-SA-16:39", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7434", "datePublished": "2017-01-13T16:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-6458 (GCVE-0-2017-6458)
Vulnerability from cvelistv5
Published
2017-03-27 17:00
Modified
2024-08-05 15:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:33:19.812Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038123" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3379" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208144" }, { "name": "97051", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT208144" }, { "name": "USN-3349-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "FEDORA-2017-72323a442f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "FEDORA-2017-20d54b2782", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K99254031" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "name": "FEDORA-2017-5ebac1c112", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T16:41:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1038123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038123" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3379" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208144" }, { "name": "97051", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT208144" }, { "name": "USN-3349-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "FEDORA-2017-72323a442f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "FEDORA-2017-20d54b2782", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K99254031" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "name": "FEDORA-2017-5ebac1c112", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-6458", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038123", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038123" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3379", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3379" }, { "name": "https://support.apple.com/HT208144", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208144" }, { "name": "97051", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97051" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu" }, { "name": "https://support.apple.com/kb/HT208144", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT208144" }, { "name": "USN-3349-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "FEDORA-2017-72323a442f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/" }, { "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/", "refsource": "CONFIRM", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/" }, { "name": "https://bto.bluecoat.com/security-advisory/sa147", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "FEDORA-2017-20d54b2782", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "name": "https://support.f5.com/csp/article/K99254031", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K99254031" }, { "name": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "name": "FEDORA-2017-5ebac1c112", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-6458", "datePublished": "2017-03-27T17:00:00", "dateReserved": "2017-03-03T00:00:00", "dateUpdated": "2024-08-05T15:33:19.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-9042 (GCVE-0-2016-9042)
Vulnerability from cvelistv5
Published
2018-06-04 20:00
Modified
2024-09-17 03:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- denial of service
Summary
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Talos | Network Time Protocol |
Version: NTP 4.2.8p9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:42:09.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038123", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038123" }, { "name": "FreeBSD-SA-17:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc" }, { "name": "1039427", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039427" }, { "name": "97046", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97046" }, { "name": "USN-3349-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded" }, { "name": "FEDORA-2017-20d54b2782", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT208144" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K39041624" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Network Time Protocol", "vendor": "Talos", "versions": [ { "status": "affected", "version": "NTP 4.2.8p9" } ] } ], "datePublic": "2017-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T19:17:22", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "1038123", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038123" }, { "name": "FreeBSD-SA-17:03", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc" }, { "name": "1039427", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039427" }, { "name": "97046", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97046" }, { "name": "USN-3349-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded" }, { "name": "FEDORA-2017-20d54b2782", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT208144" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K39041624" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-03-29T00:00:00", "ID": "CVE-2016-9042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Network Time Protocol", "version": { "version_data": [ { "version_value": "NTP 4.2.8p9" } ] } } ] }, "vendor_name": "Talos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition." } ] }, "impact": { "cvss": { "baseScore": 3.7, "baseSeverity": "Low", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "1038123", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038123" }, { "name": "FreeBSD-SA-17:03", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc" }, { "name": "1039427", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039427" }, { "name": "97046", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97046" }, { "name": "USN-3349-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded" }, { "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded" }, { "name": "FEDORA-2017-20d54b2782", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260" }, { "name": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201" }, { "name": "https://support.apple.com/kb/HT208144", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT208144" }, { "name": "https://support.f5.com/csp/article/K39041624", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K39041624" }, { "name": "https://bto.bluecoat.com/security-advisory/sa147", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "name": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2016-9042", "datePublished": "2018-06-04T20:00:00Z", "dateReserved": "2016-10-26T00:00:00", "dateUpdated": "2024-09-17T03:53:51.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8936 (GCVE-0-2019-8936)
Vulnerability from cvelistv5
Published
2019-05-15 15:37
Modified
2024-08-04 21:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
NTP through 4.2.8p12 has a NULL Pointer Dereference.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:31:37.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201903-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "name": "openSUSE-SU-2019:1143", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" }, { "name": "openSUSE-SU-2019:1158", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" }, { "name": "FEDORA-2019-b0c7f0d94a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/" }, { "name": "FEDORA-2019-694e3aa4e8", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/" }, { "name": "FEDORA-2019-f781d5c4c6", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190503-0001/" }, { "name": "FreeBSD-SA-19:04", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc" }, { "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/May/39" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=3565" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K61363039" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "name": "USN-4563-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4563-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T15:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201903-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201903-15" }, { "tags": [ "x_refsource_MISC" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "name": "openSUSE-SU-2019:1143", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" }, { "name": "openSUSE-SU-2019:1158", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" }, { "name": "FEDORA-2019-b0c7f0d94a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/" }, { "name": "FEDORA-2019-694e3aa4e8", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/" }, { "name": "FEDORA-2019-f781d5c4c6", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190503-0001/" }, { "name": "FreeBSD-SA-19:04", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc" }, { "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/May/39" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=3565" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K61363039" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "name": "USN-4563-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4563-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201903-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201903-15" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice", "refsource": "MISC", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "name": "openSUSE-SU-2019:1143", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" }, { "name": "openSUSE-SU-2019:1158", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" }, { "name": "FEDORA-2019-b0c7f0d94a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/" }, { "name": "FEDORA-2019-694e3aa4e8", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/" }, { "name": "FEDORA-2019-f781d5c4c6", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/" }, { "name": "https://security.netapp.com/advisory/ntap-20190503-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190503-0001/" }, { "name": "FreeBSD-SA-19:04", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc" }, { "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/May/39" }, { "name": "http://bugs.ntp.org/show_bug.cgi?id=3565", "refsource": "CONFIRM", "url": "http://bugs.ntp.org/show_bug.cgi?id=3565" }, { "name": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html" }, { "name": "https://support.f5.com/csp/article/K61363039", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K61363039" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "name": "USN-4563-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4563-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-8936", "datePublished": "2019-05-15T15:37:31", "dateReserved": "2019-02-19T00:00:00", "dateUpdated": "2024-08-04T21:31:37.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-7426 (GCVE-0-2016-7426)
Vulnerability from cvelistv5
Published
2017-01-13 16:00
Modified
2024-08-06 01:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:57:47.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "USN-3707-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "name": "RHSA-2017:0252", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037354" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "name": "FreeBSD-SA-16:39", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "name": "94451", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-24T10:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "USN-3707-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "name": "RHSA-2017:0252", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037354" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "name": "FreeBSD-SA-16:39", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "name": "94451", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-7426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "name": "USN-3707-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3707-2/" }, { "name": "RHSA-2017:0252", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "name": "http://nwtime.org/ntp428p9_release/", "refsource": "CONFIRM", "url": "http://nwtime.org/ntp428p9_release/" }, { "name": "VU#633847", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/633847" }, { "name": "1037354", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037354" }, { "name": "https://bto.bluecoat.com/security-advisory/sa139", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3071", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "name": "FreeBSD-SA-16:39", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "name": "94451", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94451" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-7426", "datePublished": "2017-01-13T16:00:00", "dateReserved": "2016-09-09T00:00:00", "dateUpdated": "2024-08-06T01:57:47.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-05-15 16:29
Modified
2024-11-21 04:50
Severity ?
Summary
NTP through 4.2.8p12 has a NULL Pointer Dereference.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://bugs.ntp.org/show_bug.cgi?id=3565 | Exploit, Issue Tracking, Vendor Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice | Release Notes, Vendor Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/ | ||
cve@mitre.org | https://seclists.org/bugtraq/2019/May/39 | Issue Tracking, Mailing List, Third Party Advisory | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc | Mitigation, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201903-15 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190503-0001/ | Patch, Third Party Advisory | |
cve@mitre.org | https://support.f5.com/csp/article/K61363039 | Third Party Advisory | |
cve@mitre.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/4563-1/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.ntp.org/show_bug.cgi?id=3565 | Exploit, Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/May/39 | Issue Tracking, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201903-15 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190503-0001/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K61363039 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4563-1/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netapp | clustered_data_ontap | * | |
netapp | data_ontap | - | |
fedoraproject | fedora | 28 | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
opensuse | leap | 15.0 | |
opensuse | leap | 42.3 | |
hpe | hpux-ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "matchCriteriaId": "C68F28EC-4283-4A8D-83CD-E69B2A85B0C4", "versionEndExcluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "392A1364-2739-450D-9E19-DFF93081C2C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB", "versionEndExcluding": "c.4.2.8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F", "versionEndExcluding": "4.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*", "matchCriteriaId": "0BC62D4E-D519-458C-BE4E-10DDB73A97D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p11:*:*:*:*:*:*", "matchCriteriaId": "1C420117-862A-41A9-BAE8-8B3478FAEBC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p12:*:*:*:*:*:*", "matchCriteriaId": "4A484251-3220-498C-83FE-A04B013A31A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*", "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference." }, { "lang": "es", "value": "NTP hasta 4.2.8p12 tiene una desreferencia del puntero NULL." } ], "id": "CVE-2019-8936", "lastModified": "2024-11-21T04:50:41.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-15T16:29:01.223", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=3565" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/May/39" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-15" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190503-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K61363039" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/4563-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=3565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/May/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201903-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190503-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K61363039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/4563-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-01-13 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://nwtime.org/ntp428p9_release/ | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2017-0252.html | Third Party Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3071 | Issue Tracking, Mitigation, Vendor Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities | Release Notes, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94451 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1037354 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa139 | Third Party Advisory | |
cve@mitre.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us | Third Party Advisory | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3707-2/ | Third Party Advisory | |
cve@mitre.org | https://www.kb.cert.org/vuls/id/633847 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://nwtime.org/ntp428p9_release/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0252.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3071 | Issue Tracking, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94451 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037354 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa139 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3707-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/633847 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
canonical | ubuntu_linux | 12.04 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_aus | 7.7 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
hpe | hpux-ntp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418", "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46", "versionEndExcluding": "4.3.94", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*", "matchCriteriaId": "EA207F59-B630-4BBB-9CD7-BA7B64581907", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*", "matchCriteriaId": "06AE2082-B219-4E94-89E8-E1328224C9D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*", "matchCriteriaId": "6E0F5656-3E41-4568-A810-F2CFA3677488", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*", "matchCriteriaId": "934152EB-5F5A-4BD8-B832-3B342551F9AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*", "matchCriteriaId": "6936BEB5-B765-45C5-B671-A9D0CC4988C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*", "matchCriteriaId": "BAA1E4CD-45EE-4814-AC6B-DE786C5B3B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*", "matchCriteriaId": "95779DD0-C768-4B1C-A720-23BE19606B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*", "matchCriteriaId": "1B035472-2B64-4BE4-8D25-6E31937641E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*", "matchCriteriaId": "3CE88876-F0BB-43A1-9A4A-91C5D6FFC02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*", "matchCriteriaId": "4E4BE466-B479-47BA-9A1F-F0184E252103", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*", "matchCriteriaId": "4E6D7F8F-EF71-44E6-B33F-E0265266C616", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*", "matchCriteriaId": "AC47FB1E-289A-4AA1-9DF1-0CEE13C9335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*", "matchCriteriaId": "B7BC8DB4-E715-44F1-8759-0414613C9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*", "matchCriteriaId": "5AF5BC27-EE65-4FB4-975E-FA3933B3202C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*", "matchCriteriaId": "795D50A9-41E5-40CE-88E9-391229607301", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*", "matchCriteriaId": "1DE4338B-F5B3-4410-886D-0F28A7ECE824", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*", "matchCriteriaId": "B1463DC6-D0C7-46E6-8418-B7900C99D079", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*", "matchCriteriaId": "C5B7AA5B-2BD5-4F19-A8BB-DF4677995602", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*", "matchCriteriaId": "DBCF724B-5018-4794-97D9-D8EDC2F04060", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*", "matchCriteriaId": "2A62EAF1-3D51-456F-BBE3-A2E8CBE7960D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*", "matchCriteriaId": "67D86D6C-A8A3-4CD4-B1A5-57941B51C732", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*", "matchCriteriaId": "E793243F-4179-46C9-B422-DC3D6E688B2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*", "matchCriteriaId": "6EAC9B6E-3A88-4DED-A5D4-862E076620BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*", "matchCriteriaId": "AD8E8B74-6E16-47FF-A019-54B0438A8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*", "matchCriteriaId": "3C210EFA-7BF2-4EEE-B59C-F3C75743E182", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*", "matchCriteriaId": "23A9CDE2-4520-4542-93B0-74A01E919597", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*", "matchCriteriaId": "94A7790A-DACE-4F02-B2FF-2C851EFD9717", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*", "matchCriteriaId": "5ED47A47-3CB2-45CC-8147-CFFE0B93D966", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*", "matchCriteriaId": "4FC2172C-73BD-441D-9963-5C9E89FB68F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*", "matchCriteriaId": "485C8744-A185-46EB-B27F-8A42ED76964B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*", "matchCriteriaId": "C01153E2-A4E3-4EF9-A33E-1026F578CB44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*", "matchCriteriaId": "505CE414-C5E5-4251-9F02-A8A0DA6C0E91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*", "matchCriteriaId": "607E83FB-FDB7-49CA-9DA9-B8DA43C3DF23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*", "matchCriteriaId": "864BA14B-B357-4ADD-BCE1-B2EAE4D299FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*", "matchCriteriaId": "2856AAB8-172F-4657-85FF-9FFB698C4457", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*", "matchCriteriaId": "7C2B8290-8AD6-4EDD-9736-730DD33CA73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*", "matchCriteriaId": "A509FC81-ABFD-4CE1-ABD6-C47ECCF97892", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*", "matchCriteriaId": "7111A1FB-142C-4538-BC96-F71AEDC0FB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*", "matchCriteriaId": "FB54C36C-F07A-4F99-A093-8EF10689E1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*", "matchCriteriaId": "CD57B6E4-9947-4790-BCAF-30B37C7CB837", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*", "matchCriteriaId": "232170D9-923D-4DA5-9A7D-6A5BDCD37165", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*", "matchCriteriaId": "A0BE1B30-DB6E-4029-8212-035449CEE22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*", "matchCriteriaId": "3181F3BF-8704-4D54-ABC4-CB68C89AF52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*", "matchCriteriaId": "E61A5F5E-8DCC-4809-A2DE-E39C8E01976F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*", "matchCriteriaId": "1D2E80CD-0EAA-423B-B885-EDC5BFE962BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*", "matchCriteriaId": "11F45456-692B-415D-BDBF-BA639AA622BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*", "matchCriteriaId": "FCEF3E6A-48C3-4A00-B286-58E642DE5928", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*", "matchCriteriaId": "8CE352E5-DFFC-4580-9D5E-95EE7A5C2BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "C771C48E-2B29-491D-8FF0-69D81229465D", "versionEndExcluding": "c.4.2.8.2.0", "versionStartIncluding": "b.11.31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address." }, { "lang": "es", "value": "NTP en versiones anteriores a 4.2.8p9 limita la clasificaci\u00f3n de respuestas recibidas desde las fuentes configuradas cuando la limitaci\u00f3n de clasificaci\u00f3n para todas las asociaciones est\u00e1 habilitado, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (prevenir las respuestas de las fuentes) enviando respuestas con una direcci\u00f3n de origen suplantada." } ], "id": "CVE-2016-7426", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-13T16:59:00.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94451" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037354" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/633847" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-06 20:29
Modified
2025-01-14 19:29
Severity ?
Summary
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3415 | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/541824/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/103194 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1550214 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201805-12 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20180626-0001/ | Third Party Advisory | |
cve@mitre.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
cve@mitre.org | https://www.synology.com/support/security/Synology_SA_18_13 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3415 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/541824/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103194 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1550214 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201805-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180626-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_13 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
synology | router_manager | * | |
synology | skynas | * | |
synology | virtual_diskstation_manager | * | |
synology | diskstation_manager | * | |
synology | vs960hd_firmware | * | |
synology | vs960hd | - | |
netapp | hci | - | |
netapp | solidfire | - | |
hpe | hpux-ntp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "C240BAAB-8C12-4501-9DC6-FB877304E908", "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A5D4FE7-07FC-4869-84F2-4FA767490A73", "versionEndExcluding": "4.3.92", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7B0AEDA-4FC3-4AD8-ADE3-356A4498AF95", "versionEndExcluding": "1.1.6-6931-3", "versionStartIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*", "matchCriteriaId": "C114627A-7D1E-4B0C-B004-9CFAC78F2F0F", "versionEndExcluding": "6.1.5-15254", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E65C1F9D-C457-49E8-A46B-9B15D5FCE5C7", "versionEndExcluding": "6.1.6-15266", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B270650E-B819-4CE6-B129-BF90CE8B2A03", "versionEndExcluding": "6.1.6-15266", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A606357-7469-43AD-8B5A-152C43D017DF", "versionEndExcluding": "2.2.3-1505", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB", "versionEndExcluding": "c.4.2.8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549." }, { "lang": "es", "value": "ntpd en ntp, en versiones 4.2.x anteriores a la 4.2.8p7 y versiones 4.3.x anteriores a la 4.3.92, permite que usuarios autenticados que conozcan la clave privada sim\u00e9trica creen de forma arbitraria muchas asociaciones ef\u00edmeras para ganar la selecci\u00f3n de reloj de ntpd y modifiquen el reloj de una v\u00edctima mediante un ataque Sybil. Este problema existe debido a una soluci\u00f3n incompleta para CVE-2016-1549." } ], "id": "CVE-2018-7170", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-06T20:29:01.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3415" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103194" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-06-04 20:29
Modified
2024-11-21 03:00
Severity ?
Summary
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
talos-cna@cisco.com | http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html | ||
talos-cna@cisco.com | http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html | ||
talos-cna@cisco.com | http://seclists.org/fulldisclosure/2017/Nov/7 | ||
talos-cna@cisco.com | http://seclists.org/fulldisclosure/2017/Sep/62 | ||
talos-cna@cisco.com | http://www.securityfocus.com/archive/1/540403/100/0/threaded | ||
talos-cna@cisco.com | http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded | ||
talos-cna@cisco.com | http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded | ||
talos-cna@cisco.com | http://www.securityfocus.com/bid/97046 | Permissions Required, Third Party Advisory, VDB Entry | |
talos-cna@cisco.com | http://www.securitytracker.com/id/1038123 | Third Party Advisory, VDB Entry | |
talos-cna@cisco.com | http://www.securitytracker.com/id/1039427 | Third Party Advisory, VDB Entry | |
talos-cna@cisco.com | http://www.ubuntu.com/usn/USN-3349-1 | ||
talos-cna@cisco.com | https://bto.bluecoat.com/security-advisory/sa147 | ||
talos-cna@cisco.com | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
talos-cna@cisco.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10201 | ||
talos-cna@cisco.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ | ||
talos-cna@cisco.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc | Third Party Advisory | |
talos-cna@cisco.com | https://support.apple.com/kb/HT208144 | ||
talos-cna@cisco.com | https://support.f5.com/csp/article/K39041624 | ||
talos-cna@cisco.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
talos-cna@cisco.com | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
talos-cna@cisco.com | https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260 | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Nov/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Sep/62 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540403/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97046 | Permissions Required, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038123 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039427 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3349-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa147 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10201 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT208144 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K39041624 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260 | Exploit, Mitigation, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*", "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "CA79CE41-D873-4A4A-A20C-83EB8772E5FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "53E56F4F-B418-44DD-9C97-7276A4C58F3E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB", "versionEndExcluding": "c.4.2.8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F488810-73E3-4475-975A-C2FCA037E78B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition." }, { "lang": "es", "value": "Existe una vulnerabilidad explotable de denegaci\u00f3n de servicio (DoS) en la funcionalidad de comprobaci\u00f3n de marca de tiempo de origen de ntpd 4.2.8p9. Se puede emplear un paquete de red no autenticado especialmente manipulado para reiniciar la marca de tiempo de origen esperada para los peers objetivo. Las respuestas leg\u00edtimas de los peers objetivo no pasar\u00e1n la comprobaci\u00f3n de marca de tiempo de origen (TEST2), lo que hace que la respuesta se elimine y se cree una condici\u00f3n de denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2016-9042", "lastModified": "2024-11-21T03:00:29.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "talos-cna@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-04T20:29:00.417", "references": [ { "source": "talos-cna@cisco.com", "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html" }, { "source": "talos-cna@cisco.com", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "talos-cna@cisco.com", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "source": "talos-cna@cisco.com", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "source": "talos-cna@cisco.com", "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded" }, { "source": "talos-cna@cisco.com", "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded" }, { "source": "talos-cna@cisco.com", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "source": "talos-cna@cisco.com", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97046" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038123" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039427" }, { "source": "talos-cna@cisco.com", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "source": "talos-cna@cisco.com", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "talos-cna@cisco.com", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201" }, { "source": "talos-cna@cisco.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc" }, { "source": "talos-cna@cisco.com", "url": "https://support.apple.com/kb/HT208144" }, { "source": "talos-cna@cisco.com", "url": "https://support.f5.com/csp/article/K39041624" }, { "source": "talos-cna@cisco.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "talos-cna@cisco.com", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT208144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K39041624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260" } ], "sourceIdentifier": "talos-cna@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-01-13 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://nwtime.org/ntp428p9_release/ | Third Party Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3082 | Issue Tracking, Mitigation, Vendor Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities | Release Notes, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/94448 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1037354 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa139 | Third Party Advisory | |
cve@mitre.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us | Third Party Advisory | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc | Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/40806/ | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.kb.cert.org/vuls/id/633847 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://nwtime.org/ntp428p9_release/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3082 | Issue Tracking, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/94448 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037354 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa139 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40806/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/633847 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.7 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
hpe | hpux-ntp | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46", "versionEndExcluding": "4.3.94", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p100:*:*:*:*:*:*", "matchCriteriaId": "18088A3E-C30F-4133-9D1A-B39181513EF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p101:*:*:*:*:*:*", "matchCriteriaId": "52B6CFF0-2C07-4706-A3B1-618015F52D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p102:*:*:*:*:*:*", "matchCriteriaId": "90BF6D6B-DB23-4E50-A7D3-81B5F1CC5572", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p103:*:*:*:*:*:*", "matchCriteriaId": "E79B84AA-FB11-453D-8216-CF25FBF15544", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p104:*:*:*:*:*:*", "matchCriteriaId": "EB264FC5-0D41-48F8-802D-5C1710A5B4D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p105:*:*:*:*:*:*", "matchCriteriaId": "81AB3169-0D14-46D3-9EBB-2835198EB94A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p106:*:*:*:*:*:*", "matchCriteriaId": "D09EEB13-4F4A-4EF2-9F80-66D0E0E54FDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p107:*:*:*:*:*:*", "matchCriteriaId": "7776F628-D8B9-4691-849D-4B483740CAA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p108:*:*:*:*:*:*", "matchCriteriaId": "8C83234B-7CB1-46DE-AAA3-81D457C6BE5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p109:*:*:*:*:*:*", "matchCriteriaId": "0EA68A07-98D5-4025-AA23-E32F8CD71769", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p110:*:*:*:*:*:*", "matchCriteriaId": "880AABF9-B93D-468A-8C4B-9D3760DEE6C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p111:*:*:*:*:*:*", "matchCriteriaId": "40680475-27E0-41B9-9C52-E6498A36EBBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p112:*:*:*:*:*:*", "matchCriteriaId": "6D871458-BC51-43BB-BD35-9DE945A6B772", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p113:*:*:*:*:*:*", "matchCriteriaId": "1EEE464F-6634-4214-B423-641AB29856AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p114:*:*:*:*:*:*", "matchCriteriaId": "49407030-4250-4DDD-B51A-794ED2AF8C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p115:*:*:*:*:*:*", "matchCriteriaId": "F43B2F0B-901F-4465-A736-5CC1CDDE3E42", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p116:*:*:*:*:*:*", "matchCriteriaId": "31BEC66A-6C37-407B-BBF5-35AC0FF7EC74", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p117:*:*:*:*:*:*", "matchCriteriaId": "51A56AD7-B69A-4326-9889-BF90AB22F384", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p118:*:*:*:*:*:*", "matchCriteriaId": "A145C1A2-FB8E-49A2-B1CF-D5FB43EA1525", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p119:*:*:*:*:*:*", "matchCriteriaId": "68372642-A1A1-4723-9648-F60CBF77EF50", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p120:*:*:*:*:*:*", "matchCriteriaId": "1A6C505D-3AB5-42F6-9902-C5668E28ADB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p121:*:*:*:*:*:*", "matchCriteriaId": "CE27B2F8-4F46-4DDE-920F-3EB1967A53BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p122:*:*:*:*:*:*", "matchCriteriaId": "58915E9F-AA40-46CF-B137-6BCF8798733A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p123:*:*:*:*:*:*", "matchCriteriaId": "EB4512B9-33AA-4B43-9579-C583F90581C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p124:*:*:*:*:*:*", "matchCriteriaId": "88725E06-49C9-45B4-9ECA-06B8B3EB5A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p125:*:*:*:*:*:*", "matchCriteriaId": "72126656-2722-44F4-B01C-BEC19103C0F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p126:*:*:*:*:*:*", "matchCriteriaId": "37503B24-23B0-4871-89AC-839F60A5EACC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p127:*:*:*:*:*:*", "matchCriteriaId": "83A7A62B-3189-43E7-897B-8DD9B98E6914", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p128:*:*:*:*:*:*", "matchCriteriaId": "95471C0C-0F04-4EE7-92A5-83AB955138DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p129:*:*:*:*:*:*", "matchCriteriaId": "F1FA55A0-66F8-49AB-8707-C7E4A070E5A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p130:*:*:*:*:*:*", "matchCriteriaId": "0000B855-4012-44DA-BF40-4F59A2476FB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p131:*:*:*:*:*:*", "matchCriteriaId": "EA3F0379-E0AB-429C-A1D1-8D10D96DE3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p132:*:*:*:*:*:*", "matchCriteriaId": "CB716665-7EB8-4E22-9F38-19329F0DD7B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p133:*:*:*:*:*:*", "matchCriteriaId": "E31C1F62-9AB3-4D4D-939D-EE21B7196A94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p134:*:*:*:*:*:*", "matchCriteriaId": "5CD11265-AD38-4473-9609-194BC9F67C64", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p135:*:*:*:*:*:*", "matchCriteriaId": "14CE2B31-8E10-40B5-88C6-D9807CA47B2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p136:*:*:*:*:*:*", "matchCriteriaId": "99F04650-84E0-48A9-A351-B465736D5D8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p137:*:*:*:*:*:*", "matchCriteriaId": "814A5DC9-6B9D-4813-A55F-0D81C7B5B992", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p138:*:*:*:*:*:*", "matchCriteriaId": "012727A7-261B-4F63-AB65-9DE07CE4B5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p139:*:*:*:*:*:*", "matchCriteriaId": "E724003A-14AE-445C-995B-D135EFA01FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p140:*:*:*:*:*:*", "matchCriteriaId": "44B0664F-3B93-444E-9D5B-6A8D8DA997E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p141:*:*:*:*:*:*", "matchCriteriaId": "56324E0F-41B5-4F78-8559-C008BF41D6F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p142:*:*:*:*:*:*", "matchCriteriaId": "20512BFF-402E-40C5-8A44-51BD43216FE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p143:*:*:*:*:*:*", "matchCriteriaId": "34FE8F13-56E9-4AA0-974A-B24EC585015E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p144:*:*:*:*:*:*", "matchCriteriaId": "D09C706D-0A89-4A6F-9EAE-63725B71CB79", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p145:*:*:*:*:*:*", "matchCriteriaId": "99F276D8-6B10-46C7-8673-B53001865DE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p146:*:*:*:*:*:*", "matchCriteriaId": "E3FC1D17-6238-4299-99CC-22676FE4A950", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p147:*:*:*:*:*:*", "matchCriteriaId": "695C6140-B842-4DFF-B362-B4378EEBB7DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p148:*:*:*:*:*:*", "matchCriteriaId": "2EF5BC29-E0EE-4BE2-9054-0CB7A98620B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p149:*:*:*:*:*:*", "matchCriteriaId": "2FE15E41-3CF0-48B0-A919-361AD8A12500", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p150:*:*:*:*:*:*", "matchCriteriaId": "F05BDA31-209D-492D-B48B-6456D2DC6D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p151:*:*:*:*:*:*", "matchCriteriaId": "1CF90708-FF1C-4F6B-B5EC-07D508D9A7B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p152:*:*:*:*:*:*", "matchCriteriaId": "4543D8D1-4572-4867-B90E-4CB674A9682C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p153:*:*:*:*:*:*", "matchCriteriaId": "5BF0B3DD-DE8D-4EA6-B83B-BAE7F41B36FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p154:*:*:*:*:*:*", "matchCriteriaId": "E8429C6A-5191-4F31-B073-8471D15BDABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p155:*:*:*:*:*:*", "matchCriteriaId": "C452E6AE-87FE-489C-A397-1B50243AEB6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p156:*:*:*:*:*:*", "matchCriteriaId": "835FCE24-A3D8-4E44-9D62-AF5DB95BE003", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p157:*:*:*:*:*:*", "matchCriteriaId": "4CFAC891-2709-480C-B6E3-D19F31EF7C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p158:*:*:*:*:*:*", "matchCriteriaId": "015BD2A6-0352-490E-8E8D-2CEC6BBA5728", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p159:*:*:*:*:*:*", "matchCriteriaId": "18DAFA1F-4434-47C8-8F84-97CE83BBD1CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p160:*:*:*:*:*:*", "matchCriteriaId": "715A4D93-2953-4682-9384-740A71CAE9D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p161:*:*:*:*:*:*", "matchCriteriaId": "6FD41C7B-253A-4171-82CA-50BA017C14A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p162:*:*:*:*:*:*", "matchCriteriaId": "13D73E63-D350-416C-818A-36B8F113D82C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p163:*:*:*:*:*:*", "matchCriteriaId": "301E509C-0DB3-4358-B6F7-AD133CE35F01", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p164:*:*:*:*:*:*", "matchCriteriaId": "7E5E396E-BA00-4C12-939E-28F39BFBE756", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p165:*:*:*:*:*:*", "matchCriteriaId": "F70DFABC-ECD4-4672-8822-C2370AE4BBD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p166:*:*:*:*:*:*", "matchCriteriaId": "3180ABA9-D556-4E89-AEF8-0E0BA05328AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p170:*:*:*:*:*:*", "matchCriteriaId": "A6C5461F-5BBF-47D1-8917-7A5B6A08C2EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p171:*:*:*:*:*:*", "matchCriteriaId": "8A038A59-12A6-44B1-BF28-4AC9F33B8B2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p172:*:*:*:*:*:*", "matchCriteriaId": "50FF8A7D-DA4B-4CA3-9E18-ECA2487127D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p173:*:*:*:*:*:*", "matchCriteriaId": "C897B169-0E8C-4624-A595-C016951169C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p174:*:*:*:*:*:*", "matchCriteriaId": "A358B329-E131-42AA-95D3-015BDB32D0A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p175:*:*:*:*:*:*", "matchCriteriaId": "05B2C090-7AEF-42A0-B6C2-173A8C44FE8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p176:*:*:*:*:*:*", "matchCriteriaId": "817EDB3E-9529-436A-895E-A700E99B75C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p177:*:*:*:*:*:*", "matchCriteriaId": "69C74989-1186-4780-AB7C-7393CB87DA9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p178:*:*:*:*:*:*", "matchCriteriaId": "EBA41032-724C-4198-BEE5-8F8E10542718", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p179:*:*:*:*:*:*", "matchCriteriaId": "FE00CC76-4174-481B-BE11-017E138D926C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p180:*:*:*:*:*:*", "matchCriteriaId": "90357BE1-5BED-4529-B266-01734337DD2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p181:*:*:*:*:*:*", "matchCriteriaId": "5F19B70E-C4D6-47A2-A784-7AFC8FD7A0EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p182:*:*:*:*:*:*", "matchCriteriaId": "370DF27C-5170-4E83-8C5F-2B71BB18DD2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p183:*:*:*:*:*:*", "matchCriteriaId": "24875D76-1F1D-409D-97AF-05C3EBABB6C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p184:*:*:*:*:*:*", "matchCriteriaId": "63A68652-A900-4ACA-88B1-2480481DCA3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p185:*:*:*:*:*:*", "matchCriteriaId": "8F93CAA7-43CF-4E77-948C-3B7ACB2065B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p186:*:*:*:*:*:*", "matchCriteriaId": "42AA7252-63A8-46D9-889F-82E2EB395B9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p187:*:*:*:*:*:*", "matchCriteriaId": "834B2001-0245-4229-924D-E2B663E799AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p188:*:*:*:*:*:*", "matchCriteriaId": "00DC5545-B625-4BA4-B9B3-86FA53F28078", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p189:*:*:*:*:*:*", "matchCriteriaId": "8AE16E47-74E8-4228-9A7B-9C57B85D185C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p190:*:*:*:*:*:*", "matchCriteriaId": "B6CA6F5F-F42B-4ABF-AEE1-47078EE6FA90", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p191:*:*:*:*:*:*", "matchCriteriaId": "E306D867-323D-4459-9879-B187177E04A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p192:*:*:*:*:*:*", "matchCriteriaId": "BE01F660-1B93-44AB-A8B0-8952AEFBCC62", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p193:*:*:*:*:*:*", "matchCriteriaId": "50929DCE-F805-4998-89FC-E7F058516A6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p194:*:*:*:*:*:*", "matchCriteriaId": "EC66E5EA-30CB-4305-ADD9-DDF487D33303", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p195:*:*:*:*:*:*", "matchCriteriaId": "ACCF3643-A5B9-4189-B7BA-E64DE95E66F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p196:*:*:*:*:*:*", "matchCriteriaId": "AF578C5C-F8C0-4634-A6D7-44C754F49160", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p197:*:*:*:*:*:*", "matchCriteriaId": "FCDAD4BA-937F-48FB-969A-5DAE6DE50E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p198:*:*:*:*:*:*", "matchCriteriaId": "3B46B993-3DFE-47DB-9025-B6C58DCA18A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p199:*:*:*:*:*:*", "matchCriteriaId": "00787CA7-9A1D-4B62-80B6-8556A00C7527", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p200:*:*:*:*:*:*", "matchCriteriaId": "74ED4215-C2C7-4ADB-918D-F475EBC3DC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p201:*:*:*:*:*:*", "matchCriteriaId": "FC5D6725-894C-46CC-8C34-52C9C22300C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p202:*:*:*:*:*:*", "matchCriteriaId": "EA0DA534-D1F4-4399-B289-243E7BBBA6BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p203:*:*:*:*:*:*", "matchCriteriaId": "0DF70DB3-5467-470A-8376-5076713B3F1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p204:*:*:*:*:*:*", "matchCriteriaId": "1E76CD66-A6A1-4270-85DE-894B9AE06D36", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p205:*:*:*:*:*:*", "matchCriteriaId": "8E65023E-32AF-4BD3-965B-322D03593EF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p206:*:*:*:*:*:*", "matchCriteriaId": "4C319D83-A580-42DA-95BC-7F686C7A871F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p207:*:*:*:*:*:*", "matchCriteriaId": "73B6F787-36EE-4C67-A9D4-72E45B3A4DAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p208:*:*:*:*:*:*", "matchCriteriaId": "AB9A3C57-A57E-47AB-8C32-1642434A2260", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p209:*:*:*:*:*:*", "matchCriteriaId": "67BBA775-FB30-4A6C-8D4B-A22B43A6FC37", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p210:*:*:*:*:*:*", "matchCriteriaId": "114260EB-CEED-4C8C-A4E5-98A2934113D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p211:*:*:*:*:*:*", "matchCriteriaId": "D0325DED-6705-45DD-98B0-75A20EA94CEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p212:*:*:*:*:*:*", "matchCriteriaId": "0F79E496-0F22-412B-9CD2-BADECC0BC86A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p213:*:*:*:*:*:*", "matchCriteriaId": "C90A4534-2057-4527-8C95-65DC36EC1B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p214:*:*:*:*:*:*", "matchCriteriaId": "A1EF1F52-B93B-4DF9-BDC3-89E591083B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p215:*:*:*:*:*:*", "matchCriteriaId": "EEF972A9-28D6-432C-BF89-FE8B308FD73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p216:*:*:*:*:*:*", "matchCriteriaId": "131ADB2D-B0DD-43E4-B92F-03C4A6B4606E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p217:*:*:*:*:*:*", "matchCriteriaId": "064F1862-EEF3-4937-A1BA-4DB77136D9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p218:*:*:*:*:*:*", "matchCriteriaId": "B2579BDC-7511-4EB5-93EE-BC6661856DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p219:*:*:*:*:*:*", "matchCriteriaId": "3303ED56-842C-4199-8C90-4C8946829861", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p22:*:*:*:*:*:*", "matchCriteriaId": "93AEBFB8-C063-4862-ADA5-32C8AD6A215D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p220:*:*:*:*:*:*", "matchCriteriaId": "6ABDA987-7222-4374-9C90-7995D348A4D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p221:*:*:*:*:*:*", "matchCriteriaId": "A8AD850A-183B-4F0F-9306-C3DC3791220B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p222:*:*:*:*:*:*", "matchCriteriaId": "18234B94-97C7-4B6B-89DD-EEC23184CE47", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p223:*:*:*:*:*:*", "matchCriteriaId": "CF6212AE-49E5-4163-ADD1-52D30C1292A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p224:*:*:*:*:*:*", "matchCriteriaId": "836448A1-E62B-48E7-B169-A792DA1C6BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p225:*:*:*:*:*:*", "matchCriteriaId": "A67A194C-F7C6-4568-A607-BD1469ECBDB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p226:*:*:*:*:*:*", "matchCriteriaId": "9132CD66-3BE4-45DB-8E0D-45470846736A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p227:*:*:*:*:*:*", "matchCriteriaId": "1F1B56D9-CAB0-4040-9AFA-5DF697FB7FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p228:*:*:*:*:*:*", "matchCriteriaId": "84C631CF-3B8A-45CA-BB63-1B0C0BBA7587", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p229:*:*:*:*:*:*", "matchCriteriaId": "FBFD2AD3-141F-44EF-836E-ECBBCCA1FED7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p23:*:*:*:*:*:*", "matchCriteriaId": "AD38DF5B-0FE3-46B0-9313-0BEDB2FB85BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p230:*:*:*:*:*:*", "matchCriteriaId": "69D9B2C0-7579-465F-B18B-379639E9927A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p231:*:*:*:*:*:*", "matchCriteriaId": "29566789-CFE1-4103-AD50-032D5D028757", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p232:*:*:*:*:*:*", "matchCriteriaId": "1D7ECA6E-89D8-45B5-84CE-8CB17C7A3768", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p233:*:*:*:*:*:*", "matchCriteriaId": "F027DACE-C9E2-4D72-9DA3-F809A64EF2F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p234:*:*:*:*:*:*", "matchCriteriaId": "92643045-7392-47DA-93A5-90CD0AA51E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p235:*:*:*:*:*:*", "matchCriteriaId": "62130999-2898-4009-B8C2-FF7F7951A604", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p236:*:*:*:*:*:*", "matchCriteriaId": "98FC8466-24E9-41D0-8250-44D7F8C693C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p237:*:*:*:*:*:*", "matchCriteriaId": "954EF915-6A9E-44E6-883E-A7A9F6284700", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p238:*:*:*:*:*:*", "matchCriteriaId": "05E8C9DA-EA55-4DBC-A96C-0AD149557A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p239:*:*:*:*:*:*", "matchCriteriaId": "1CC9AFDA-C77E-4165-BDFC-32A7B84509D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p24:*:*:*:*:*:*", "matchCriteriaId": "19B1C33A-80DD-4942-81A3-5A91B77B902D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p240:*:*:*:*:*:*", "matchCriteriaId": "C8DB8DDB-AF56-41F4-950B-A2A2E39317DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p241:*:*:*:*:*:*", "matchCriteriaId": "BC80B6F6-11A0-449A-897E-575F6F56F87A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p242:*:*:*:*:*:*", "matchCriteriaId": "13CE8993-F930-47C4-95E0-56C56353304B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p243:*:*:*:*:*:*", "matchCriteriaId": "9FE86C91-2490-48DF-8106-FE880E7814A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p244:*:*:*:*:*:*", "matchCriteriaId": "FE2353F1-6E1B-4230-A4B4-C0B797708C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p245:*:*:*:*:*:*", "matchCriteriaId": "0B219D0C-E30F-4E2A-BB7A-1A31536DED5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p246:*:*:*:*:*:*", "matchCriteriaId": "B219601B-9514-41E0-835B-62364078C818", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p247:*:*:*:*:*:*", "matchCriteriaId": "3F418265-D805-4252-B756-10DE5A859419", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p248:*:*:*:*:*:*", "matchCriteriaId": "E1926405-EE10-43E3-BA5A-762FAE137257", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p249:*:*:*:*:*:*", "matchCriteriaId": "13DF9CF5-51DA-4CE8-804C-5242F2B15C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p25:*:*:*:*:*:*", "matchCriteriaId": "FE315238-7191-4A2E-A3C6-2162BE589C78", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p250:*:*:*:*:*:*", "matchCriteriaId": "635C986B-3F82-460C-9BD7-38F8216CDD79", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p251:*:*:*:*:*:*", "matchCriteriaId": "966C53A2-DD1A-4470-81EE-E725BC289DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p252:*:*:*:*:*:*", "matchCriteriaId": "03228A7D-9D07-4C4C-B9E2-48227F85CA85", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p253:*:*:*:*:*:*", "matchCriteriaId": "7BAD1823-8E3A-440D-A3C9-2597D1D5C44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p254:*:*:*:*:*:*", "matchCriteriaId": "6D7A38FD-04F9-4E79-96CD-A207206EA661", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p255:*:*:*:*:*:*", "matchCriteriaId": "23483EEB-9B8B-4A5B-8ABB-84751D7B7A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p256:*:*:*:*:*:*", "matchCriteriaId": "72EBA29F-09BB-4E3C-B8C4-4F33F87ABA4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p257:*:*:*:*:*:*", "matchCriteriaId": "4D5B23B7-6AE4-48F3-8D2B-D8FE47958686", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p258:*:*:*:*:*:*", "matchCriteriaId": "7CCA6DEC-66A1-47EF-8F58-A043FF3882CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p259:*:*:*:*:*:*", "matchCriteriaId": "D7A4794F-715B-4494-A98B-9D667651EC67", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p26:*:*:*:*:*:*", "matchCriteriaId": "78648B53-1528-4815-AAEA-AEC828A1BF6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p260:*:*:*:*:*:*", "matchCriteriaId": "DBB6B326-CD08-4E1F-9C8B-A20B9E271CAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p261:*:*:*:*:*:*", "matchCriteriaId": "12177C82-48B7-4059-9FE3-67B6AD4394D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p262:*:*:*:*:*:*", "matchCriteriaId": "2BFFB250-B848-47AD-BCCC-11EE14065A37", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p263:*:*:*:*:*:*", "matchCriteriaId": "1444370E-BF8D-4AE5-9FBB-9105E6EF78CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p264:*:*:*:*:*:*", "matchCriteriaId": "72D025B8-1A4D-4818-8E12-13355A21E2BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p265:*:*:*:*:*:*", "matchCriteriaId": "BB1A2AD1-309B-44B3-9E86-A1F68DCE9106", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p266:*:*:*:*:*:*", "matchCriteriaId": "A2DFE9B7-5261-4786-91B3-C9E3045EA6B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p267:*:*:*:*:*:*", "matchCriteriaId": "28D3667D-61E3-469E-98FA-09BB84DC0DD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p268:*:*:*:*:*:*", "matchCriteriaId": "2DB842A1-DEBE-47B7-A071-A6551DC2E57E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p269:*:*:*:*:*:*", "matchCriteriaId": "427D2B99-488A-4AA6-8136-A9DF944A59D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p27:*:*:*:*:*:*", "matchCriteriaId": "DFD3B0D3-F8B1-4B49-89AD-B7720264ABE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p270:*:*:*:*:*:*", "matchCriteriaId": "B47B5F96-4634-4D14-9BB3-F18B28DE9C54", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p271:*:*:*:*:*:*", "matchCriteriaId": "2C8080B1-8407-4174-B32B-E650ADEB69C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p272:*:*:*:*:*:*", "matchCriteriaId": "D3472CD9-C523-4DC1-9008-9454BDAC8132", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p273:*:*:*:*:*:*", "matchCriteriaId": "9FF54974-0C40-4503-BFD3-5B44EEFD67E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p274:*:*:*:*:*:*", "matchCriteriaId": "C1449012-219E-48C6-A6A0-EA9EDA04FE37", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p275:*:*:*:*:*:*", "matchCriteriaId": "A793C450-6BC8-46E7-8AB4-87BC4612B0AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p276:*:*:*:*:*:*", "matchCriteriaId": "E33C55DC-07AE-45A5-89A4-76A489E5A867", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p277:*:*:*:*:*:*", "matchCriteriaId": "AE0D8BBB-F96D-48EA-8BB6-D73C36734EE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p278:*:*:*:*:*:*", "matchCriteriaId": "A85B2D52-AF38-47CF-9841-63DA64465418", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p279:*:*:*:*:*:*", "matchCriteriaId": "1B84D901-CBB1-4094-BBE7-5B26E8D39F84", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p28:*:*:*:*:*:*", "matchCriteriaId": "E682794C-6BAD-4C62-A56B-B8FC5C246A57", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p280:*:*:*:*:*:*", "matchCriteriaId": "44E97C82-3600-4A69-A553-BBABD7DF0C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p281:*:*:*:*:*:*", "matchCriteriaId": "4E804D9F-4902-445C-A4C0-B3AA9C50990E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p282:*:*:*:*:*:*", "matchCriteriaId": "88C5398A-5782-4DF4-A0EC-504C6B504A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p283:*:*:*:*:*:*", "matchCriteriaId": "D9155ABF-92D7-4A32-8B8F-D657FB7ECF09", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p284:*:*:*:*:*:*", "matchCriteriaId": "1B286708-81FB-4A43-A641-2DD2A2AB32BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p285:*:*:*:*:*:*", "matchCriteriaId": "E8E97E21-5860-4A69-A41C-D6B016557EBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p286:*:*:*:*:*:*", "matchCriteriaId": "6B7A219D-B28B-4F30-9476-5011614EDA87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p287:*:*:*:*:*:*", "matchCriteriaId": "93B3E6C4-FE6F-4DD6-A843-536BE332FBB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p288:*:*:*:*:*:*", "matchCriteriaId": "DF1882D1-8491-4DAA-B90B-66C70EE0B8C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p289:*:*:*:*:*:*", "matchCriteriaId": "568AE9F5-A26A-4257-BC46-57A173274C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p29:*:*:*:*:*:*", "matchCriteriaId": "C99673E9-9FB8-4FE8-85EE-E90402E40FA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p290:*:*:*:*:*:*", "matchCriteriaId": "135B5E0C-09C9-4F7B-95E7-73ADD8C47332", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p291:*:*:*:*:*:*", "matchCriteriaId": "8FDFE148-F5F8-464D-AD72-9BA98B58B784", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p292:*:*:*:*:*:*", "matchCriteriaId": "790452BA-E1BF-4F4B-9189-55BEA1860DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p293:*:*:*:*:*:*", "matchCriteriaId": "80C3FEF9-99D3-4454-98F3-09B62E712B0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p294:*:*:*:*:*:*", "matchCriteriaId": "C481B6EE-AA07-4F44-AE3E-AD5EBF94D0A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p295:*:*:*:*:*:*", "matchCriteriaId": "937BC376-9D57-4466-A6EC-3493AB74ABA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p296:*:*:*:*:*:*", "matchCriteriaId": "0B4E4FD4-6957-410A-B25B-3CB66AA6D92D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p297:*:*:*:*:*:*", "matchCriteriaId": "C2CB55C6-D996-459E-9AF0-CA4E5E568016", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p298:*:*:*:*:*:*", "matchCriteriaId": "66623F9F-9BA0-449D-845E-73119AB85C7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p299:*:*:*:*:*:*", "matchCriteriaId": "95BC5517-41A4-42B4-A36E-598BD1BF5632", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p30:*:*:*:*:*:*", "matchCriteriaId": "F2BB76A4-E4D3-4AAA-84E7-13F1EBF713AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p300:*:*:*:*:*:*", "matchCriteriaId": "DB6CB51C-FB4C-47F8-A742-4CE96241ACF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p301:*:*:*:*:*:*", "matchCriteriaId": "E0EDE1E5-EC6E-4042-845F-6E9C2DDA7183", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p302:*:*:*:*:*:*", "matchCriteriaId": "086316E9-06E8-421A-A204-6313E5EE8B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p303:*:*:*:*:*:*", "matchCriteriaId": "756A71A5-061F-4A31-A63B-668782164B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p304:*:*:*:*:*:*", "matchCriteriaId": "ACBE70BB-8F32-4964-9FB0-D3CAEC21045A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p305:*:*:*:*:*:*", "matchCriteriaId": "EC650C12-B1BF-4D73-A760-5E4FE5BAFDDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p306:*:*:*:*:*:*", "matchCriteriaId": "3FF0E35E-2361-4ACD-BE48-B52E0C809B9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p307:*:*:*:*:*:*", "matchCriteriaId": "4B6E27C1-7523-4B43-9B8A-B085F8798D13", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p308:*:*:*:*:*:*", "matchCriteriaId": "B7A3C1CA-101C-4E11-B7B8-EB8E52CE9A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p309:*:*:*:*:*:*", "matchCriteriaId": "8BF8463C-8E44-4C0D-9B1C-2FA1BD2CC190", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p31:*:*:*:*:*:*", "matchCriteriaId": "C6631CB8-E3BC-473C-A217-E5CBBE8C8AD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p310:*:*:*:*:*:*", "matchCriteriaId": "19EA0570-CCA5-40A6-A563-3A89072396A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p311:*:*:*:*:*:*", "matchCriteriaId": "82F242D7-A19B-489E-A43E-8D03524AC563", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p312:*:*:*:*:*:*", "matchCriteriaId": "12615298-51F2-482D-98B5-04FF3405C89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p313:*:*:*:*:*:*", "matchCriteriaId": "5F27F883-CBAF-4638-9CE0-CDE1E6EEBCFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p314:*:*:*:*:*:*", "matchCriteriaId": "0661907B-783E-4E7A-A762-ED6AF2DC3125", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p315:*:*:*:*:*:*", "matchCriteriaId": "E7BD9562-F3D2-4B25-8F64-8F98F8F20055", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p316:*:*:*:*:*:*", "matchCriteriaId": "A34A0A94-1009-47AC-B697-01A18179FA83", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p317:*:*:*:*:*:*", "matchCriteriaId": "72B6EE25-093E-4F65-9158-956FF358BC4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p318:*:*:*:*:*:*", "matchCriteriaId": "2C1A56B8-B7F4-4D3E-991E-55EAE6821295", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p319:*:*:*:*:*:*", "matchCriteriaId": "2B5CA008-E02B-4FF6-9D38-5CC38D366819", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p32:*:*:*:*:*:*", "matchCriteriaId": "3829DBDA-C15A-4F55-8B65-30FA3DD6BB34", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p320:*:*:*:*:*:*", "matchCriteriaId": "6ACF0AA3-BC82-4FB0-B17C-F20553E96A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p321:*:*:*:*:*:*", "matchCriteriaId": "B4614A1D-27A2-4952-80EB-1E0096F3A9DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p322:*:*:*:*:*:*", "matchCriteriaId": "F2D45FAB-8F9A-4680-B91C-24A0FC5D53C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p323:*:*:*:*:*:*", "matchCriteriaId": "73CCF245-7374-4DE1-AE14-8520D529FB97", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p324:*:*:*:*:*:*", "matchCriteriaId": "175AA245-3CA7-48A1-8B59-BE3EBDD50223", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p325:*:*:*:*:*:*", "matchCriteriaId": "E193D864-8AA3-4769-A60A-EDCF1708B868", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p326:*:*:*:*:*:*", "matchCriteriaId": "5EBD0753-F448-47BC-B3A2-878C7CABFFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p327:*:*:*:*:*:*", "matchCriteriaId": "C1DD4AF6-8E30-440B-B8E5-8D23F8C752C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p328:*:*:*:*:*:*", "matchCriteriaId": "A7973D03-DA1D-4470-BB44-E6D1336EA05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p329:*:*:*:*:*:*", "matchCriteriaId": "C23977C3-F49A-46FF-BE70-161D4A198651", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p33:*:*:*:*:*:*", "matchCriteriaId": "DA9F54EB-2377-4CE0-8517-564415EC79AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p330:*:*:*:*:*:*", "matchCriteriaId": "4A50CB94-38F4-4AC1-8D56-3C4DBDE5DA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p331:*:*:*:*:*:*", "matchCriteriaId": "ADA7B8B0-FB9E-4833-BD49-4B29A6E8CE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p332:*:*:*:*:*:*", "matchCriteriaId": "EB39BE69-4CC6-4142-ADAB-CAE31C60F02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p333:*:*:*:*:*:*", "matchCriteriaId": "0B71E349-4644-46C4-B94B-49EA7D61ADFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p334:*:*:*:*:*:*", "matchCriteriaId": "AFA3FB6E-CEB5-43D5-B741-661BAE199EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p335:*:*:*:*:*:*", "matchCriteriaId": "92E625E3-3E09-4EEA-8808-C60B2C5D99B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p336:*:*:*:*:*:*", "matchCriteriaId": "31F5F683-26B8-4582-948A-2AFC5FB4EBDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p337:*:*:*:*:*:*", "matchCriteriaId": "6F7A8648-0E43-47D9-872E-4B24BE68E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p338:*:*:*:*:*:*", "matchCriteriaId": "3B19F768-A654-4A11-924D-0D741A5B5063", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p339:*:*:*:*:*:*", "matchCriteriaId": "F4DD99A1-AF44-4177-A94E-1663CCFFDBE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p34:*:*:*:*:*:*", "matchCriteriaId": "76B59A05-EF56-4A06-8EF2-49BABA11EFCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p340:*:*:*:*:*:*", "matchCriteriaId": "1A8E03B1-0A87-43EB-A9E0-A4F396948EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p341:*:*:*:*:*:*", "matchCriteriaId": "6812A7B2-8267-45DA-8E9A-E9987D07ED6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p342:*:*:*:*:*:*", "matchCriteriaId": "13FFE741-5489-4427-9E30-4B499BE419BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p343:*:*:*:*:*:*", "matchCriteriaId": "2D720BAC-CF8C-4394-B7B3-E410467D02CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p344:*:*:*:*:*:*", "matchCriteriaId": "17CD0194-9899-4FC0-AC48-305C98180D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p345:*:*:*:*:*:*", "matchCriteriaId": "250A861E-93BE-419A-84D7-EB3CBC5F37FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p346:*:*:*:*:*:*", "matchCriteriaId": "7BB3A976-A7E3-4C59-9BBE-DE1B815F7871", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p347:*:*:*:*:*:*", "matchCriteriaId": "212DADA8-A0B7-499C-A6B0-8696AB1B103F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p348:*:*:*:*:*:*", "matchCriteriaId": "DAF064E3-4A50-40E3-A183-42D062E27FB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p349:*:*:*:*:*:*", "matchCriteriaId": "93400158-D5E2-4B49-8F28-BB4398217F07", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p35:*:*:*:*:*:*", "matchCriteriaId": "79747394-C70B-45AE-9533-CE095E44952E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p350:*:*:*:*:*:*", "matchCriteriaId": "17DDD2ED-9510-487F-B598-27BFADE10D18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p351:*:*:*:*:*:*", "matchCriteriaId": "F90A32B0-B237-42AE-9FAE-5AF125877DFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p352:*:*:*:*:*:*", "matchCriteriaId": "945E5002-84D6-44A0-8327-CD01A746F842", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p353:*:*:*:*:*:*", "matchCriteriaId": "892FD4C7-17EE-4845-BCFA-1564081CD289", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p354:*:*:*:*:*:*", "matchCriteriaId": "68DA4791-4619-4977-9B2C-489142D0055B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p355:*:*:*:*:*:*", "matchCriteriaId": "911A3C69-8D28-4D27-8EC7-ED02FE74BFE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p356:*:*:*:*:*:*", "matchCriteriaId": "BB125173-0F9C-4B57-BEC0-490C01EE2C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p357:*:*:*:*:*:*", "matchCriteriaId": "09D58DE3-C8C4-4C14-B38E-84D1AC874E3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p358:*:*:*:*:*:*", "matchCriteriaId": "AF9DDED5-9383-4014-8674-CD5A6D7E246A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p359:*:*:*:*:*:*", "matchCriteriaId": "BB4AABDA-3A4E-411F-A3F0-22FC06157D7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p36:*:*:*:*:*:*", "matchCriteriaId": "FE9E7970-8A2A-4B9A-BD8C-0B7345DDDC6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p360:*:*:*:*:*:*", "matchCriteriaId": "9B5B447C-066F-47FF-A033-7B98638E6506", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p361:*:*:*:*:*:*", "matchCriteriaId": "3A2FADF1-EA35-44B1-B200-3535F0899622", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p362:*:*:*:*:*:*", "matchCriteriaId": "EA45115B-7FF5-4479-841D-DAA05EF525E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p363:*:*:*:*:*:*", "matchCriteriaId": "9FEC288C-ACB1-4782-AD3D-C13CD4822C9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p364:*:*:*:*:*:*", "matchCriteriaId": "B3948830-399B-4457-9C79-FE542885396D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p365:*:*:*:*:*:*", "matchCriteriaId": "297B4B83-3B41-4D05-951E-55671DFA3401", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p366:*:*:*:*:*:*", "matchCriteriaId": "97722AA3-54FF-43DC-A926-AFB00A216D7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p367:*:*:*:*:*:*", "matchCriteriaId": "F7059D68-D871-4C92-8DC3-C37C3660831F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p368:*:*:*:*:*:*", "matchCriteriaId": "4CA21B77-EE77-48B2-88A9-FDF818B83425", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p369:*:*:*:*:*:*", "matchCriteriaId": "669E93E5-70BD-405F-A92C-6623F7A53F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p37:*:*:*:*:*:*", "matchCriteriaId": "B4B06D02-D9F6-4C09-BEE0-A5491B97A24C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p370:*:*:*:*:*:*", "matchCriteriaId": "53A468F9-6C1E-4A2E-AFDA-979E570D6DA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p371:*:*:*:*:*:*", "matchCriteriaId": "7C064AC9-11CC-458C-9AE1-B4F870AD468C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p372:*:*:*:*:*:*", "matchCriteriaId": "81F985B3-B0F9-4A41-B014-4222786C960C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p373:*:*:*:*:*:*", "matchCriteriaId": "E3A86AF0-6A98-474C-BB6E-2C3FB6ABCCE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p374:*:*:*:*:*:*", "matchCriteriaId": "42F94BA2-09E5-4373-8940-B723E1D12B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p375:*:*:*:*:*:*", "matchCriteriaId": "88956750-A888-4E68-B7A5-59C7259E5BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p376:*:*:*:*:*:*", "matchCriteriaId": "9E738CE1-1E0C-4822-AC3A-917FA4FFA612", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p377:*:*:*:*:*:*", "matchCriteriaId": "767426BE-5BBF-426E-A0C6-2D367B954F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p378:*:*:*:*:*:*", "matchCriteriaId": "A84376E3-A31F-4EEB-8F87-A9C965C2F1DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p379:*:*:*:*:*:*", "matchCriteriaId": "EB98463C-35D4-4252-945B-4C50A385CE5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p38:*:*:*:*:*:*", "matchCriteriaId": "0C337ACA-81A0-4017-8CEB-7CB790172C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p380:*:*:*:*:*:*", "matchCriteriaId": "50D0EB63-C1BF-403F-A0F4-EBADBBBE9345", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p381:*:*:*:*:*:*", "matchCriteriaId": "D7C31F2F-163E-4384-B87E-AFE1C8C7865F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p382:*:*:*:*:*:*", "matchCriteriaId": "220DE1DB-5F19-4C4C-A8E3-5650870BD1ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p383:*:*:*:*:*:*", "matchCriteriaId": "323572A7-67C5-42AD-9E65-E54719B701DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p384:*:*:*:*:*:*", "matchCriteriaId": "DF6BE9BC-4C72-4D8C-96C7-8867580BD557", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p385:*:*:*:*:*:*", "matchCriteriaId": "D1C34D5F-DE47-4CB8-B1F7-2796D48EDF26", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p386:*:*:*:*:*:*", "matchCriteriaId": "C54C231A-25A6-480B-87A4-6F3E9AC242EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p387:*:*:*:*:*:*", "matchCriteriaId": "0EE812DF-8E96-4FF8-8D03-10B98A3C4563", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p388:*:*:*:*:*:*", "matchCriteriaId": "CC809B83-705E-438D-B9C7-8AED384E55E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p389:*:*:*:*:*:*", "matchCriteriaId": "E82497A8-05F6-4AA5-9A98-C084BF6C87A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p39:*:*:*:*:*:*", "matchCriteriaId": "80D57A00-D9A5-4C70-B523-0064C56AD7D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p390:*:*:*:*:*:*", "matchCriteriaId": "2B65C876-191E-43DD-8C00-B3FFB643798C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p391:*:*:*:*:*:*", "matchCriteriaId": "1C55D80B-4597-4C13-8BDA-659F19CA17AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p392:*:*:*:*:*:*", "matchCriteriaId": "CD2417D5-0B48-41AC-B529-B6B958FD1529", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p393:*:*:*:*:*:*", "matchCriteriaId": "E86B9970-181A-4227-85C5-6EA9DC83EC6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p394:*:*:*:*:*:*", "matchCriteriaId": "C9AB4545-315D-430A-AEF5-FA51C91A81C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p395:*:*:*:*:*:*", "matchCriteriaId": "A48EA953-A9AC-4B0E-80D7-97E813AA6116", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p396:*:*:*:*:*:*", "matchCriteriaId": "21FA80EF-86AD-4B10-847F-BE1A21DA90DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p397:*:*:*:*:*:*", "matchCriteriaId": "064A35E0-362D-4EAB-9659-B66A51B8A57C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p398:*:*:*:*:*:*", "matchCriteriaId": "FC33854D-77D0-403A-9DD6-0AE57DDF1D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p399:*:*:*:*:*:*", "matchCriteriaId": "0E8128A3-F0A9-443A-9B39-9DDEBD6C9E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p4:*:*:*:*:*:*", "matchCriteriaId": "E0040B79-5D07-4BEA-8861-8D827FB31735", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p40:*:*:*:*:*:*", "matchCriteriaId": "658F5E60-CA2F-4B96-B48A-715CCF553F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p400:*:*:*:*:*:*", "matchCriteriaId": "263B51E4-1659-427B-A79B-D4E9DF28A57F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p401:*:*:*:*:*:*", "matchCriteriaId": "8B97CE98-A1EE-4ED6-A108-4BF40EA3F81D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p402:*:*:*:*:*:*", "matchCriteriaId": "8C818138-F20A-4F39-A5C0-6D2937EE77F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p403:*:*:*:*:*:*", "matchCriteriaId": "BE12A159-F94F-4410-AF88-8966101C1212", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p404:*:*:*:*:*:*", "matchCriteriaId": "ECC145C1-F5F5-4EE7-96FE-6F5949E483A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p405:*:*:*:*:*:*", "matchCriteriaId": "7F57CF8E-FE13-4E21-8F35-25068C3F36B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p406:*:*:*:*:*:*", "matchCriteriaId": "D75F5F25-9D47-4FA5-95DF-47CDCB3E9C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p407:*:*:*:*:*:*", "matchCriteriaId": "9EE75158-53F3-46F3-8028-860CD0F0493D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p408:*:*:*:*:*:*", "matchCriteriaId": "DA633D5D-F25E-41D0-A881-ED59EFE1593D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p409:*:*:*:*:*:*", "matchCriteriaId": "4166C7AD-F945-4AA0-A4FB-055D5F90A84C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p41:*:*:*:*:*:*", "matchCriteriaId": "CCCC6A0F-7728-4AB7-ABFB-6D8B7C327319", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p410:*:*:*:*:*:*", "matchCriteriaId": "FE0C6655-04AA-41ED-8186-C384A5D80CAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p411:*:*:*:*:*:*", "matchCriteriaId": "7218D1AE-D531-4688-91DF-EFF5D2690C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p412:*:*:*:*:*:*", "matchCriteriaId": "BB32757C-97CB-4782-A7D0-7905C08AB72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p413:*:*:*:*:*:*", "matchCriteriaId": "A8091E4A-054C-4AED-BE48-783DC4D0C8D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p414:*:*:*:*:*:*", "matchCriteriaId": "16CD62B2-904D-4109-BBF6-4CF71CDD171D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p415:*:*:*:*:*:*", "matchCriteriaId": "D5B8C246-0B8C-462E-B3EB-49988C387B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p416:*:*:*:*:*:*", "matchCriteriaId": "B66B920C-F32C-47C6-A456-29D075E0FDD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p417:*:*:*:*:*:*", "matchCriteriaId": "A424EAE0-2B4E-4B08-B1E7-DFC9FCC0B863", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p418:*:*:*:*:*:*", "matchCriteriaId": "3601971C-CFB7-499F-8C46-5D58D6C8E252", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p419:*:*:*:*:*:*", "matchCriteriaId": "3E44EACB-8FAC-4FCE-B83F-9B1EFC2B8A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p42:*:*:*:*:*:*", "matchCriteriaId": "F6FE7257-F93D-406E-B4B3-668E41C6A8ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p420:*:*:*:*:*:*", "matchCriteriaId": "17B12369-3740-487C-ACBB-8D09E933CEFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p421:*:*:*:*:*:*", "matchCriteriaId": "4E8D3E83-11C6-4169-A401-536758AC683F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p422:*:*:*:*:*:*", "matchCriteriaId": "88DC6549-8447-4981-9462-AF54AB224E43", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p423:*:*:*:*:*:*", "matchCriteriaId": "8B3712F6-CD70-4D27-B51B-C152C730E4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p424:*:*:*:*:*:*", "matchCriteriaId": "C538EC07-E3B5-48F4-B2BE-1D183C8167FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p425:*:*:*:*:*:*", "matchCriteriaId": "2536D2A7-00E8-42F3-8040-C2C581BD18EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p426:*:*:*:*:*:*", "matchCriteriaId": "41C5A447-68F1-4C86-B324-56346B5ED4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p427:*:*:*:*:*:*", "matchCriteriaId": "9A2B4489-5A50-45B0-9AC3-55226D104C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p428:*:*:*:*:*:*", "matchCriteriaId": "98AE334D-93C1-410A-A993-559C4ECA6EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p429:*:*:*:*:*:*", "matchCriteriaId": "55C23879-14D6-44CF-B72C-077648B7850C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p43:*:*:*:*:*:*", "matchCriteriaId": "DDE8AE33-9A76-4921-838C-FD26BE966936", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p430:*:*:*:*:*:*", "matchCriteriaId": "343DE53D-5471-4A71-9ECF-F4B49FE87DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p431:*:*:*:*:*:*", "matchCriteriaId": "1659F07D-AC4B-4946-AA6D-CD07BEFFD260", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p432:*:*:*:*:*:*", "matchCriteriaId": "E5E5356A-C7DE-4E77-B563-9D9411A94487", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p433:*:*:*:*:*:*", "matchCriteriaId": "A90B1CB8-7CD6-455D-8B83-890DFE17F168", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p434:*:*:*:*:*:*", "matchCriteriaId": "42F60614-8A4C-48D9-9AFE-03334B5F39A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p435:*:*:*:*:*:*", "matchCriteriaId": "C2CEAAC3-0738-4EFA-9C6A-140B61D6FB77", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p436:*:*:*:*:*:*", "matchCriteriaId": "06F04569-8733-4326-AAAF-E1C0FDE9A067", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p437:*:*:*:*:*:*", "matchCriteriaId": "DE4263C9-9885-4AD5-9331-6EA04B579DC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p438:*:*:*:*:*:*", "matchCriteriaId": "D34C4700-3763-402B-88A1-0E0CDAB003C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p439:*:*:*:*:*:*", "matchCriteriaId": "5AFC88C6-C0C7-4F06-B36F-4C07F68714DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p44:*:*:*:*:*:*", "matchCriteriaId": "434184FF-2FB6-4577-8F85-E488EB89D642", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p440:*:*:*:*:*:*", "matchCriteriaId": "03CD81E7-9C87-4E8C-8B38-A9C790D3740D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p441:*:*:*:*:*:*", "matchCriteriaId": "AA114487-9C20-4D4C-9BE0-61E83EEA881A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p442:*:*:*:*:*:*", "matchCriteriaId": "AD46FDA8-410D-46ED-B9DA-DBE377A52F7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p443:*:*:*:*:*:*", "matchCriteriaId": "2549A1EB-CF4C-4B72-BE21-4DB6C232620E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p444:*:*:*:*:*:*", "matchCriteriaId": "C4A5B2DE-6EDB-4687-95E9-B7BDEE8A4F52", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p445:*:*:*:*:*:*", "matchCriteriaId": "38655472-BDE7-450A-8655-D217648FB502", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p446:*:*:*:*:*:*", "matchCriteriaId": "9A9EB39C-40E4-4B2F-AC0F-9AB12ABFE9E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p447:*:*:*:*:*:*", "matchCriteriaId": "1EEA66A5-F0EE-407D-A40E-4AF5E1AA052D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p448:*:*:*:*:*:*", "matchCriteriaId": "F659FB12-BED8-4DA3-886C-E49FECD2E84D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p449:*:*:*:*:*:*", "matchCriteriaId": "B4D83B72-6A3A-49A2-BC10-AF588CC4F8CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p45:*:*:*:*:*:*", "matchCriteriaId": "3DBDA6E7-5849-4551-A4E4-4C846074B55D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p450:*:*:*:*:*:*", "matchCriteriaId": "E6B6B540-1E6C-4031-87D8-159B683E42E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p451:*:*:*:*:*:*", "matchCriteriaId": "8AE3CDE6-4061-446C-8CA9-1F86CF5D0CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p452:*:*:*:*:*:*", "matchCriteriaId": "3524F3C9-1FB9-478B-927B-FCDAD58F9A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p453:*:*:*:*:*:*", "matchCriteriaId": "1E539437-A77D-4672-B7F7-401435A5DF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p454:*:*:*:*:*:*", "matchCriteriaId": "73EAA52B-5E57-4633-A651-2763433A581E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p455:*:*:*:*:*:*", "matchCriteriaId": "84791D19-F4E2-430A-891B-562C8A42F572", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p456:*:*:*:*:*:*", "matchCriteriaId": "56CBFA28-AD97-436D-87E6-A958C80F463D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p457:*:*:*:*:*:*", "matchCriteriaId": "5E82DEF1-83E4-47B1-8A71-AAB6723B092E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p458:*:*:*:*:*:*", "matchCriteriaId": "73BDEBD9-C4A3-44AA-9067-6EAA0FB68D2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p459:*:*:*:*:*:*", "matchCriteriaId": "99E12DE4-36F7-47E3-B296-B7DD4908C191", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p46:*:*:*:*:*:*", "matchCriteriaId": "9520436F-C8D9-40F0-BBE5-2B15D286B8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p460:*:*:*:*:*:*", "matchCriteriaId": "B8213C7C-A1C6-491C-88DF-46799E1149FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p461:*:*:*:*:*:*", "matchCriteriaId": "E4A6EEC8-A256-4A29-88B9-EBD29F0E9984", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p462:*:*:*:*:*:*", "matchCriteriaId": "C480C64A-1591-45A0-9F8E-4ADF90ECEC4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p463:*:*:*:*:*:*", "matchCriteriaId": "C1F1E185-3A8B-4523-9C4D-35B219DAAB10", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p464:*:*:*:*:*:*", "matchCriteriaId": "58DAACF5-282F-4D4F-BA58-1DCDB31B0E29", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p465:*:*:*:*:*:*", "matchCriteriaId": "7CC89215-1461-42F4-8F0A-0E60AD86CE5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p466:*:*:*:*:*:*", "matchCriteriaId": "D477F5D9-B8C2-498B-B979-5524BA64F082", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p467:*:*:*:*:*:*", "matchCriteriaId": "F7983F2C-182E-415E-B770-288BB165A660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p468:*:*:*:*:*:*", "matchCriteriaId": "7A3795B8-817E-40E5-B348-74A15FF713C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p469:*:*:*:*:*:*", "matchCriteriaId": "87CE91F2-1FB0-41E0-89E6-58EEFA6BE41D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p47:*:*:*:*:*:*", "matchCriteriaId": "9BD6AC08-3F51-4410-8ECB-99B44A72568E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p470:*:*:*:*:*:*", "matchCriteriaId": "690FC7C1-4B39-49C6-9603-007A3E88DA66", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p471:*:*:*:*:*:*", "matchCriteriaId": "3918A234-477D-4C0D-9E6D-CFDFA582B402", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p472:*:*:*:*:*:*", "matchCriteriaId": "EBC0DCF1-EE12-4D07-A643-ABF51E0D1C21", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p473:*:*:*:*:*:*", "matchCriteriaId": "B7900782-B462-4A44-96CE-A3A014E93709", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p474:*:*:*:*:*:*", "matchCriteriaId": "3AF076BA-2834-448B-AA81-1BA5C99DA860", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p475:*:*:*:*:*:*", "matchCriteriaId": "2917A9B3-37EC-4F51-A4D6-68270E0BFBA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p476:*:*:*:*:*:*", "matchCriteriaId": "F9A85B79-DACE-48DB-A575-2F14FAACFF5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p477:*:*:*:*:*:*", "matchCriteriaId": "F2BC6626-9073-4E98-8D81-EB68F3FF1DDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p478:*:*:*:*:*:*", "matchCriteriaId": "E625449B-FAAC-4053-B775-8745CAF4DDB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p479:*:*:*:*:*:*", "matchCriteriaId": "6BC60030-61E0-41E7-B11A-B9A4AE3F15FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p48:*:*:*:*:*:*", "matchCriteriaId": "6AF437C6-62A2-4B99-9A24-F721A60D7D2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p480:*:*:*:*:*:*", "matchCriteriaId": "00A93F72-960F-4616-9E13-C7D070AA9284", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p481:*:*:*:*:*:*", "matchCriteriaId": "4BB13DEF-50F9-44F4-B727-FD9121A5D94A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p482:*:*:*:*:*:*", "matchCriteriaId": "A4CEFBF7-F69A-431B-BF71-DAB5958888F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p483:*:*:*:*:*:*", "matchCriteriaId": "24903C79-D6BE-4961-B787-1C3B9E88C81B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p484_rc1:*:*:*:*:*:*", "matchCriteriaId": "89313369-5D95-45B2-A0F7-E105608D133D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p485_rc1:*:*:*:*:*:*", "matchCriteriaId": "160577D9-BC9A-40E9-BECB-7EFA9E1A4D04", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p486_rc1:*:*:*:*:*:*", "matchCriteriaId": "0FCFFCCD-13F9-43F2-861D-839B7046A1EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p49:*:*:*:*:*:*", "matchCriteriaId": "0E730137-E93D-4AFB-B1E5-9CE89AF0CE9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p5:*:*:*:*:*:*", "matchCriteriaId": "D00C1A08-1AFF-4AED-9F32-6F7400E24427", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p50:*:*:*:*:*:*", "matchCriteriaId": "16871277-E425-4A35-A6DC-C89EBA7E74E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p51:*:*:*:*:*:*", "matchCriteriaId": "EDE0405D-F8DE-458D-8D75-FE582D1DC137", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p52:*:*:*:*:*:*", "matchCriteriaId": "637D12F8-33EB-4D35-A56F-8B6A124B2936", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p53:*:*:*:*:*:*", "matchCriteriaId": "F0C13374-0966-4372-951D-853D5CC81E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p54:*:*:*:*:*:*", "matchCriteriaId": "41B72391-9B36-4196-9BF0-E3C44B5A6C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p55:*:*:*:*:*:*", "matchCriteriaId": "AFA07E87-043E-456C-B435-6B7EF3CAA58A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p56:*:*:*:*:*:*", "matchCriteriaId": "165E10ED-42CE-4313-B630-D2051DA29F1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p57:*:*:*:*:*:*", "matchCriteriaId": "2EDCA346-8FA5-4781-B69E-37F76DD07039", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p58:*:*:*:*:*:*", "matchCriteriaId": "9FD3A0D8-D947-40AA-A548-CD48BB3837AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p59:*:*:*:*:*:*", "matchCriteriaId": "7B97D60B-CCAE-4F13-9573-23D65280C0B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p6:*:*:*:*:*:*", "matchCriteriaId": "6478C98A-FC07-457D-996D-53B9361B52D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p60:*:*:*:*:*:*", "matchCriteriaId": "D379EAE2-0D54-4FDE-A241-6E4B03692315", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p61:*:*:*:*:*:*", "matchCriteriaId": "91F16EF5-4F62-4D04-AF2E-9867CC96F42F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p62:*:*:*:*:*:*", "matchCriteriaId": "5E1AA127-8578-4DDE-9189-437FF384F24A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p63:*:*:*:*:*:*", "matchCriteriaId": "3F084101-EC75-4F1A-B0D3-D4B161A4C30A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p64:*:*:*:*:*:*", "matchCriteriaId": "B9BE6456-9805-4FC6-B937-7505480E5BF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p65:*:*:*:*:*:*", "matchCriteriaId": "28FF7D7B-79D5-4CFA-BED1-9F68200BDBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p66:*:*:*:*:*:*", "matchCriteriaId": "BBD63622-9C07-4110-BFB6-45574CA51E85", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p67:*:*:*:*:*:*", "matchCriteriaId": "326AF319-30FA-4460-8095-9895F7778808", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p68:*:*:*:*:*:*", "matchCriteriaId": "C4F42335-E1C1-4A35-8F05-B04F73EA36AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p69:*:*:*:*:*:*", "matchCriteriaId": "C0A3A492-9985-4FE8-82ED-5B793F0CD252", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p7:*:*:*:*:*:*", "matchCriteriaId": "C1D01BD4-27BF-49BD-9305-F26E0EC778AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p70:*:*:*:*:*:*", "matchCriteriaId": "3EB30D8D-4AE8-4975-BFAC-7A4352666335", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p71:*:*:*:*:*:*", "matchCriteriaId": "A29E2D36-7374-4F80-90C5-6E5B4A03DB42", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p72:*:*:*:*:*:*", "matchCriteriaId": "BD4EF13C-9561-4791-AF4A-790466A38A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p73:*:*:*:*:*:*", "matchCriteriaId": "06DF6604-2175-4341-BEED-BF381A3E82FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p74:*:*:*:*:*:*", "matchCriteriaId": "046E1F04-A028-41C1-ACA5-0A4E13B57CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p75:*:*:*:*:*:*", "matchCriteriaId": "FC712CBC-5212-4EDB-8F2E-25D839C417B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p76:*:*:*:*:*:*", "matchCriteriaId": "71D343FF-390C-4EA4-863D-A684D49AA321", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p77:*:*:*:*:*:*", "matchCriteriaId": "A75FD97F-B998-4506-8D81-87A9A4DD7216", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p78:*:*:*:*:*:*", "matchCriteriaId": "EB24361D-B7F2-4A98-9AF7-ADB5E91FEBBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p79:*:*:*:*:*:*", "matchCriteriaId": "825CC1F4-A5F3-4F2F-BA82-AE5843AFA0D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p8:*:*:*:*:*:*", "matchCriteriaId": "F4E82220-4E07-41B0-952A-9C0CC0973D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p80:*:*:*:*:*:*", "matchCriteriaId": "6969C6F6-845C-4023-B7D3-2E0ECE90D355", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p81:*:*:*:*:*:*", "matchCriteriaId": "6EB84D6B-FC5A-4AC3-9F2D-EA3015917FCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p82:*:*:*:*:*:*", "matchCriteriaId": "3B0487A0-CA40-4DA6-9CE2-B912180FCDC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p83:*:*:*:*:*:*", "matchCriteriaId": "904B93E2-D880-49A7-B6EB-E4CC0274CE49", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p84:*:*:*:*:*:*", "matchCriteriaId": "FE6E7BAC-0D0E-4BE7-A3EB-5DC39FFD3BD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p85:*:*:*:*:*:*", "matchCriteriaId": "6D66BC48-C3BA-4BEA-BE22-15E08400F7EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p86:*:*:*:*:*:*", "matchCriteriaId": "1A33C1B1-72FA-4B7A-BFB1-74A8C8B9E0AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p87:*:*:*:*:*:*", "matchCriteriaId": "671D4E8C-27EB-404B-8360-4DDB17794C69", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p88:*:*:*:*:*:*", "matchCriteriaId": "19CE5AEB-1A3E-4E4E-9582-90FFF796F750", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p89:*:*:*:*:*:*", "matchCriteriaId": "9673E80A-55D3-4D2C-B8E0-2EE46950DB8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p9:*:*:*:*:*:*", "matchCriteriaId": "38F02F01-569A-445D-A954-D9369E0B8850", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p90:*:*:*:*:*:*", "matchCriteriaId": "97E2530E-CD9B-4DE1-ABCE-4777F54D8DF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p91:*:*:*:*:*:*", "matchCriteriaId": "6470A9D0-4C38-4A3D-90EE-3B1D9DB6E25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p92:*:*:*:*:*:*", "matchCriteriaId": "CB5503D1-4DF1-402A-83BA-46EF69CE88F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p93:*:*:*:*:*:*", "matchCriteriaId": "DE5410A0-A66E-4759-9D7A-268374747936", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p94:*:*:*:*:*:*", "matchCriteriaId": "B44716FB-1789-45E7-A2E1-06489D29DDFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p95:*:*:*:*:*:*", "matchCriteriaId": "E00F67B6-7B05-4EAE-8004-080590CC6381", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p96:*:*:*:*:*:*", "matchCriteriaId": "8BF82B7F-A4B8-4294-BF92-7B09EE1A61F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p97:*:*:*:*:*:*", "matchCriteriaId": "8F8E44FE-91B3-44B6-B793-65176C01294F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p98:*:*:*:*:*:*", "matchCriteriaId": "4F81E473-FDFA-49B1-B2F9-DE44BFC4333E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p99:*:*:*:*:*:*", "matchCriteriaId": "8E4ED509-8B0B-4F3E-9378-193500762248", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "C771C48E-2B29-491D-8FF0-69D81229465D", "versionEndExcluding": "c.4.2.8.2.0", "versionStartIncluding": "b.11.31", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query." }, { "lang": "es", "value": "La funci\u00f3n read_mru_list en NTP en versiones anteriores a 4.2.8p9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una consulta mrulist manipulada." } ], "id": "CVE-2016-7434", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-13T16:59:00.557", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3082" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94448" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037354" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40806/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/633847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://nwtime.org/ntp428p9_release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40806/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/633847" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-06 20:29
Modified
2025-01-14 19:29
Severity ?
Summary
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3454 | Mitigation, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/541824/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/103339 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201805-12 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20180626-0001/ | Third Party Advisory | |
cve@mitre.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3707-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3707-2/ | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Third Party Advisory | |
cve@mitre.org | https://www.synology.com/support/security/Synology_SA_18_13 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3454 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/541824/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103339 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201805-12 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180626-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3707-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3707-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_13 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
synology | router_manager | * | |
synology | skynas | * | |
synology | virtual_diskstation_manager | * | |
synology | diskstation_manager | * | |
synology | vs960hd_firmware | * | |
synology | vs960hd | - | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
canonical | ubuntu_linux | 18.04 | |
netapp | hci | - | |
netapp | solidfire | - | |
hpe | hpux-ntp | * | |
oracle | fujitsu_m10-1_firmware | * | |
oracle | fujitsu_m10-1 | - | |
oracle | fujitsu_m10-4_firmware | * | |
oracle | fujitsu_m10-4 | - | |
oracle | fujitsu_m10-4s_firmware | * | |
oracle | fujitsu_m10-4s | - | |
oracle | fujitsu_m12-1_firmware | * | |
oracle | fujitsu_m12-1 | - | |
oracle | fujitsu_m12-2_firmware | * | |
oracle | fujitsu_m12-2 | - | |
oracle | fujitsu_m12-2s_firmware | * | |
oracle | fujitsu_m12-2s | - | |
oracle | fujitsu_m10-1_firmware | * | |
oracle | fujitsu_m10-1 | - | |
oracle | fujitsu_m10-4_firmware | * | |
oracle | fujitsu_m10-4 | - | |
oracle | fujitsu_m10-4s_firmware | * | |
oracle | fujitsu_m10-4s | - | |
oracle | fujitsu_m12-1_firmware | * | |
oracle | fujitsu_m12-1 | - | |
oracle | fujitsu_m12-2_firmware | * | |
oracle | fujitsu_m12-2 | - | |
oracle | fujitsu_m12-2s_firmware | * | |
oracle | fujitsu_m12-2s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418", "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*", "matchCriteriaId": "0BC62D4E-D519-458C-BE4E-10DDB73A97D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*", "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7B0AEDA-4FC3-4AD8-ADE3-356A4498AF95", "versionEndExcluding": "1.1.6-6931-3", "versionStartIncluding": "1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*", "matchCriteriaId": "C114627A-7D1E-4B0C-B004-9CFAC78F2F0F", "versionEndExcluding": "6.1.5-15254", "vulnerable": true }, { "criteria": "cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E65C1F9D-C457-49E8-A46B-9B15D5FCE5C7", "versionEndExcluding": "6.1.6-15266", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B270650E-B819-4CE6-B129-BF90CE8B2A03", "versionEndExcluding": "6.1.6-15266", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A606357-7469-43AD-8B5A-152C43D017DF", "versionEndExcluding": "2.2.3-1505", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB", "versionEndExcluding": "c.4.2.8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C32584F2-910F-40D2-B6EE-EA4D23E10093", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F63BFBA-A4D8-43D1-A13E-DEED6AEF596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D512DA28-0734-43F5-A2F8-0828AE02AC9A", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4BB5347-D09D-4FC5-9F1C-7F3E036C18AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5262B15-F2CC-4E49-A5C3-DA8AC77EE93F", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "529D4274-F33B-47C7-A3FB-6F86096FD955", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA7AD36E-DC2F-400B-A3CC-8E3410C65316", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "A534E662-66B7-448B-A763-6B043112C877", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3179F5BF-7A7E-4C2C-A8A0-D8918C8FF809", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "95541D18-5C33-49E9-924D-0B21162EC2C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AA98A6E-9490-4824-9ED3-3D72F63E8D43", "versionEndExcluding": "xcp2361", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "22FD4F61-0A4F-4C74-A852-B1CD3639E1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB5D9B37-5071-407B-A717-B686786226B4", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F63BFBA-A4D8-43D1-A13E-DEED6AEF596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "562A7D6E-B216-4182-A5FB-4AFE811CE601", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4BB5347-D09D-4FC5-9F1C-7F3E036C18AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FE144E5-A9AA-4688-880A-5001AB418010", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "529D4274-F33B-47C7-A3FB-6F86096FD955", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A56DEDA3-5B9D-4FF3-B681-7F052AE9891D", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "A534E662-66B7-448B-A763-6B043112C877", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B775A394-D1BB-4558-8DFC-8B99195EEF6D", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "95541D18-5C33-49E9-924D-0B21162EC2C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10A49B2E-A679-4D8F-A027-570A7DE83134", "versionEndExcluding": "xcp3070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "22FD4F61-0A4F-4C74-A852-B1CD3639E1D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association." }, { "lang": "es", "value": "El motor de protocolo en ntp, en versiones 4.2.6 anteriores a la 4.2.8p11, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (interrupci\u00f3n) mediante el env\u00edo continuado de un paquete con una marca de tiempo zero-origin y la direcci\u00f3n IP de origen \"del otro lado\" de una asociaci\u00f3n intercalada que provoca que el ntpd de la v\u00edctima restablezca su asociaci\u00f3n." } ], "id": "CVE-2018-7185", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-06T20:29:01.500", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "cve@mitre.org", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3454" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103339" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201805-12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180626-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3707-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_13" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-27 17:59
Modified
2025-04-20 01:37
Severity ?
Summary
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html | ||
cve@mitre.org | http://seclists.org/fulldisclosure/2017/Nov/7 | ||
cve@mitre.org | http://seclists.org/fulldisclosure/2017/Sep/62 | ||
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3379 | Patch, Vendor Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/97051 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1038123 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-3349-1 | ||
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa147 | ||
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ | ||
cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/ | ||
cve@mitre.org | https://support.apple.com/HT208144 | Third Party Advisory | |
cve@mitre.org | https://support.apple.com/kb/HT208144 | ||
cve@mitre.org | https://support.f5.com/csp/article/K99254031 | ||
cve@mitre.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
cve@mitre.org | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
cve@mitre.org | https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Nov/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Sep/62 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3379 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97051 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038123 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3349-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa147 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208144 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT208144 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K99254031 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
hpe | hpux-ntp | * | |
apple | mac_os_x | * | |
siemens | simatic_net_cp_443-1_opc_ua_firmware | * | |
siemens | simatic_net_cp_443-1_opc_ua | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F", "versionEndExcluding": "4.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46", "versionEndExcluding": "4.3.94", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*", "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB", "versionEndExcluding": "c.4.2.8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "64CBADD5-9C10-4D8F-9844-B6FB82695786", "versionEndExcluding": "10.13", "versionStartIncluding": "10.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F488810-73E3-4475-975A-C2FCA037E78B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en las funciones ctl_put * en NTP en versiones anteriores a 4.2.8p10 y 4.3.x en versiones anteriores a 4.3.94 permiten a usuarios remotos autenticados tener un impacto no especificado a trav\u00e9s de una variable larga." } ], "id": "CVE-2017-6458", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-27T17:59:00.633", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3379" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97051" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038123" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "source": "cve@mitre.org", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208144" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/kb/HT208144" }, { "source": "cve@mitre.org", "url": "https://support.f5.com/csp/article/K99254031" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "cve@mitre.org", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "cve@mitre.org", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2017/Nov/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2017/Sep/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3349-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bto.bluecoat.com/security-advisory/sa147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT208144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K99254031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }